ΑΛΗΘΩΣ

CIA’s Latest Greatest Failure

Government agencies that are skilled at invading nearly everyone’s privacy worldwide are sometimes totally inept at keeping their own internal communications secure. The problem is particularly acute for the Central Intelligence Agency (CIA), which must maintain secure contact with thousands of foreign agents scattered all over the world. By secure contact one means being able to provide specific targeting to the agents and receive in return detailed information that responds to what is being sought without any third party being able to intercept or interpret what is being shared.

Communicating is the most vulnerable element in any foreign agent operation, particularly as counter-intelligence services commit major resources to cracking the systems used to link an agent in the field with his case officer or handler, who might be in the same country under diplomatic cover but just as easily might be in another nearby country or halfway around the world.

Various media reports have lately been detailing a catastrophic communications security failure by the CIA that took place between 2007 and 2013. In simple terms, what took place was this: the Agency developed a method of covertly communicating with its agents through the internet that involved sites which enabled two way communications that were believed to be both secure and efficient. It presumably operated like social media sites where you have to log in, provide a password and then are able to send and receive messages. It almost certainly had some level of encryption built into it and there may have been several layers of passwords and/or questions that the user had to answer to gain access.

Once developed, the system, which was originally intended only for occasional low-level use, was then deployed to handle nearly all the CIA’s agent communications worldwide, including a number of key countries targeted by Washington, to include Iran and China. Each country had a separate site and the sites themselves were set up under innocuous business or social cover arrangements which presumably would have made them of no interest to prowling counterintelligence services.

What exactly went wrong is not completely clear, but the mechanism was discovered by Iranian counterintelligence, possibly employing information provided by a double agent. The Iranians determined what kind of indicators and components the CIA site had and then went on a Google search to find other similar sites. They then watched their site as well as the others, noting both their activity and their idiosyncrasies, and were presumably able to penetrate the site directed against them. At some point, they passed what they had learned on to the Chinese and possibly others.

The Chinese expanded on the Iranian work by breaking through the firewall in their country’s site and getting into the entire system. It was possible to identify all the CIA agents in China. More than two dozen were arrested, tortured and killed and a like number were found and executed in Iran, though some were warned by the CIA and were able to escape. Agents in other countries were also exfiltrated as a security measure because it was not known to what extent the information on the system had been compromised and shared. The damage is still being assessed, but one thing that is known is that the United States knew little or nothing about what was going on in China and Iran at a critical time when negotiations over nuclear programs and North Korea were taking place.

The internet communications system was used so extensively because it was easy to use. When it eventually crashed, fully 70% of CIA communications with agents were potentially compromised. Ironically, a CIA contractor had, in 2008, warned that the internet system had major flaws that could be exploited. He was fired for his pains.

Secret communications to protect spies are as old as the Greeks and Romans, who used codes and substitution ciphers. The leap into internet communications by the CIA demonstrated that no system is infallible. The CIA got lazy and did not do its homework when setting up communications plans with agents. The reality is that running agents in a hostile foreign country is more an art than a science. You communicate with a spy in a way that fits in with his lifestyle so as not to arouse suspicion. He or she might be able to take phone calls, or receive letters with invisible writing. They might have the privacy to do burst communications from a computer to a satellite. Or they might prefer to use the old-fashioned methods — to include chalk marks signaling dead drops, brush passes and encrypted communications using one-time pads. CIA, which lost many of its skilled spies post 9/11 after it went crazy over electronics, drones and paramilitary operations, will now have to relearn Basic Espionage 101. It will not be easy and will take years to do if it is even possible. Some might argue, perhaps, that the world would be a better and safer place if it is not done at all.

Related

The biggest failure of all was Truman’s promulgation of the National Security Act of 1947, which established the CIA — a mistake which he purportedly acknowledged after he left office. JFK also had the right idea when he proposed, after the Bay of Pigs fiasco, to cut up the Agency “into a thousand pieces”. Unfortunately he failed to do so, and ultimately paid for his inaction.

Featured Video

From the Archives

By Paul J. Balles | March 8, 2010

Living through five or six major wars has hardened me to what I thought were the extremes of inhuman cruelty and brutality.

Two things made those extremes almost bearable: the brutality always revealed – at least according to the media coverage – the viciousness of the enemy. It was therefore quite understandable when our “brave men and women” pulverized the enemy.

Films of Japanese torturing captive Americans somehow justified holding over 7,000 Japanese Americans in internment camps during World War II; and only a small percentage of Americans found the bombing of Hiroshima and Nagasaki unreasonably vengeful at best, at worst, depraved.

The media giants in America portrayed the North Koreans as barbaric beasts with their captives, quite unlike their southern counterpoints – our allies during the Korean War. No one ever felt the need to explain how the South Koreans were a civilized breed while the North Koreans were absolute savages, at least according to the official line.

In Vietnam, our warriors justifiably (or so the media made us believe) dropped napalm on the North Vietnamese who had the gall to hide in villages and tunnels to ravage our invaders. At least it was accepted practice until some rogue photojournalist filmed a young girl screaming down a Vietnamese road in flames. … continue

Aletho News Original Content

By Aletho News | January 9, 2012

This article will examine some of the connections between the US and UK National Security apparatus and the appearance of the anthropogenic global warming (AGW) theory beginning after the accident at Three Mile Island. … continue

More Links

Contact:

atheonews (at) gmail.com

disclaimer

This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.

This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.

Nothing within this site or linked to by this site constitutes investment advice or medical advice.

Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.

The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.

The word "alleged" is deemed to occur before the word "fraud." Since the rule of law still applies. To peasants, at least.

Fair Use

This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.

DMCA Contact

This is information for anyone that wishes to challenge our “fair use” of copyrighted material.

If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.

We will respond and take necessary action immediately.

If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.

All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.